Company Description
Be part of AIM's growing success.
American Iron and Metals (AIM) is a recognized global leader in the metal recycling industry, with more than 125 locations and 3,500 employees worldwide. We have continued to thrive over the past eight decades (we just celebrated our 86th anniversary!) thanks to the dedication of our employees and the continued trust and support of our customers.
Be part of the AIM team, a growing team that, over the years, has successfully transformed into a multifaceted company whose business divisions include metal recycling (AIM Recycling), construction waste recycling (AIM Eco-Centre), weld assembly manufacturing (AIM Solder), demolition and dismantling (AIM Delsan), and automotive recycling (Kenny U-Pull). We are proud to do good things for the environment to help create a greener, more sustainable future for all.
It's simple, we do it well. We strive for excellence.
Job Description
Design, deploy, and manage the lifecycle of SOC platforms (SIEM, SOAR, EDR).
Integrate data from various sources and build log ingestion pipelines.
Automate alert prioritization and incident response tasks.
Develop and refine correlation rules and behavioral detections aligned with MITRE's ATT&CK framework.
Assess detection gaps and implement improvements using Red/Purple Team techniques.
Provide technical support to SOC analysts during incident management.
Develop investigation scripts and participate in post-incident reviews.
Participate in the off-hours on-call rotation for incident coverage.
Monitor the health, performance, and data integrity of SOC tools and pipelines.
Ensure high availability, scalability, and secure configuration of security technologies. Collaborate with IT, cloud, and application teams to ensure comprehensive log collection.
Maintain documentation of detection logic, processes, and system configurations.
Contribute to audits, compliance reviews, and evidence gathering activities.
Qualifications
Bachelor's degree in computer science, cybersecurity, or equivalent experience.
Minimum 3 years of experience in security engineering or threat detection.
Hands-on experience with SIEM platforms (e.g., Microsoft Sentinel, Splunk, QRadar), SOAR, and endpoint security tools.
Excellent scripting skills (Python, PowerShell, Bash) for automation and tool integration.
Good knowledge of MITRE ATT&CK frameworks, NIST CSF, and CIS controls.
Strong analytical and problem-solving skills.
Demonstrated ownership and accountability for security technologies or systems.
Experience with cloud-native security tools and logs (Azure, AWS, GCP).
Experience integrating external data feeds and building custom parsers.
Recognized certifications: GCIA, GCIH, GCED, CISSP, CySA+, AZ-500, Security+, etc. (Asset)